The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Development of tools for modeling human reasoning (common sense reasoning) by analogy in intelligent decision support systems is considered. Special attention is drawn to modeling reasoning by structural analogy taking the context into account. This work was supported by RFBR.
The paper presents a study of generating test sequences for the SCSI (small computer systems interface) interface. For this purpose a special conformance test generator has been developed. The paper describes the conformance testing algorithm and the conditions that are assumed for the tests. Test generation method is based on UIO (unique input output) technique which is an unambiguous state identification...
In this paper formulated the system of the interconnected definitions of performance for components and computer network as a whole, functioning in typical modes. Examined the specification of quantitative parameters of computer networks architecture. Theory allows obtain quantitative evaluations of computer networks performance in typical modes of functioning.
The deployment of distributed systems is extremely complex. Indeed, software deployment faces significant problems of success and safety. These problems are due to the lack of a unified model, a global architecture for deployment and an explicit dependency representation among the target system and application components. Therefore, we advocate moving from an ad hoc approach to a structured, systematic...
The following topics are dealt with: modeling; methodology and tools; computer network dependability; software security and dependability; applications.
This paper discusses some dependability problems (e.g. message delays) related to clock drifts in the processing nodes of real-time networks based on event and time triggered interfaces. We show that having detected the clock drift, it is reasonable to delay the shutdown of the network node whose clock synchronization algorithm is not able to track a high clock drift. We observed that transient clock...
This work discusses an approach to solve a problem of estimation of equipment remaining life based on historical failure records. An approach typically adopted to solve this problem is based on parametric models of equipment lifetime, fitted to failure data. Since the lifetime data is most often censored, the model fit as well as goodness of fit procedures should handle censored observations. While...
A method of reliability and functional analysis related to discrete transport systems is presented. The proposed analysis is based on modeling and simulating of the system behavior. Monte Carlo simulation is used for proper reliability and functional parameters calculation. The simulator is built using Scalable Simulation Framework (SSF). No restriction on the system structure and on a kind of distribution...
Complex network information systems are usually responsible for realizing client requests of business level services. Often these services are critical for the company and it is very important to ensure that appropriate reconfiguration will be applied in case of system malfunction. Due to the complexity of systems, huge amount of dependencies and impacting factors, the analytical approach may be too...
One of the main principles of contemporary firewalls is protecting internal resources of the system from intruders and checking correctness of requests forwarding to the particular service . Restrictions on firewalls cause that in many situation potential client has limited availability of the service. Although current implementations of firewalls are able to determine permissible number of session...
E-mailing as one of the most popular Internet communication service is very prone to spamming, i.e. the process of flooding our mailboxes with unsolicited messages. Every day, separating good messages from those coming from spammers we waste time and resources. It is urgent to find out an effective method of fighting with spam that should take into account not only the currently used spammers' methods...
E-mail system has been designed once to be one of the most reliable internet services. All possible steps were taken in the protocol to assure either a positive delivery of e-mail or the return of an error message. This is now circumvented in many ways by various antispam techniques and the SMTP protocol cannot be considered reliable anymore. The paper discusses some of the current SMTP protocol modifications...
Aim of this paper is presentation of operating of Multi-Service Telecommunication Systems (MSTS) [1], which have the star or multi-star structure, considering parameters, which influence on system productivity, creating of functional and mathematical models, designing of basics methodology and methods, which are necessary for quicker automated modeling, estimation and choosing parameters of MSTS on...
Nowadays voice over Internet protocol (VoIP) is becoming an evolutionary technology in telecommunications. In this paper the study is focused on the resources that are allocated for VoIP calls. Resource allocation in a VoIP system and resource degradation when new demands for resources arrive at the system are modeled. To counteract resource degradation and improve availability and service reliability,...
The features of real-time dependable systems are availability, reliability, safety and security. In the near future, real-time systems will be able to adapt themselves according to the specific requirements and real-time dependability assessment technique will be able to classify modules as faulty or fault-free. Software fault prediction models help us in order to develop dependable software and they...
Not so long ago data warehouses were used to process data sets loaded periodically. We could distinguish two kinds of ETL processes: full and incremental. Now we often have to process real-time data and analyse them almost on-the-fly, so the analysis are always up to date. There are many possible applications for real-time data warehouses. In most cases two features are important: delivering data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.